[go: up one dir, main page]

TWI620089B - Secure computer - Google Patents

Secure computer Download PDF

Info

Publication number
TWI620089B
TWI620089B TW103128328A TW103128328A TWI620089B TW I620089 B TWI620089 B TW I620089B TW 103128328 A TW103128328 A TW 103128328A TW 103128328 A TW103128328 A TW 103128328A TW I620089 B TWI620089 B TW I620089B
Authority
TW
Taiwan
Prior art keywords
security
subsystem
computer
data
video
Prior art date
Application number
TW103128328A
Other languages
Chinese (zh)
Other versions
TW201516736A (en
Inventor
羅斯金索芬
王震華
普騰喬許
秦紹安
Original Assignee
杰納絲科技股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 杰納絲科技股份有限公司 filed Critical 杰納絲科技股份有限公司
Publication of TW201516736A publication Critical patent/TW201516736A/en
Application granted granted Critical
Publication of TWI620089B publication Critical patent/TWI620089B/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F13/00Interconnection of, or transfer of information or other signals between, memories, input/output devices or central processing units
    • G06F13/38Information transfer, e.g. on bus
    • G06F13/382Information transfer, e.g. on bus using universal interface adapter
    • G06F13/385Information transfer, e.g. on bus using universal interface adapter for adaptation of a particular data processing system to different peripheral devices
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F13/00Interconnection of, or transfer of information or other signals between, memories, input/output devices or central processing units
    • G06F13/38Information transfer, e.g. on bus
    • G06F13/42Bus transfer protocol, e.g. handshake; Synchronisation
    • G06F13/4282Bus transfer protocol, e.g. handshake; Synchronisation on a serial bus, e.g. I2C bus, SPI bus
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Storage Device Security (AREA)

Abstract

本發明係關於用於保護其他非安全電腦子系統的系統及架構。根據一個態樣,本發明提供用於以安全方式執行軟體之獨立的硬體平臺。根據另一態樣,本發明提供控制及保護所有碟、網路及其他I/O異動之手段。根據更進一步之態樣,本發明提供監控及防止未授權使用者及惡意軟體活動之手段。額外的態樣包括提供用於裝置及使用者認證以及加密密鑰管理之安全性平臺;提供執行背景備份快照之手段;以及提供致能對電腦操作之完全管理的手段。 The present invention relates to systems and architectures for protecting other non-secure computer subsystems. According to one aspect, the present invention provides an independent hardware platform for executing software in a secure manner. According to another aspect, the present invention provides a means of controlling and protecting all discs, networks, and other I/O transactions. According to still further aspects, the present invention provides a means of monitoring and preventing unauthorized users and malicious software activities. Additional aspects include providing a security platform for device and user authentication and encryption key management; providing means to perform background backup snapshots; and providing means to enable full management of computer operations.

Description

安全性電腦 Security computer

本發明係關於用於保護具有非安全性子系統之電腦系統的系統及架構。 The present invention relates to systems and architectures for protecting computer systems having non-secure subsystems.

同在申請中之申請案第13/396,582號顯著地推進了計算機系統安全之技術現狀,該申請案之內容以引用之方式全部併入本文中。然而,仍有某些挑戰及改良機會。 The state of the art of computer system security is significantly advanced in the application Serial No. 13/396,582, the disclosure of which is incorporated herein in its entirety by reference. However, there are still some challenges and opportunities for improvement.

習知的計算裝置通常包括:一對多習知類型的子系統,諸如儲存裝置、網路、音訊/視訊、I/O介面等。然而,此等子系統對於許多不同類型之威脅通常為固有地不安全且易受攻擊。 Conventional computing devices typically include: one-to-many, well-known types of subsystems, such as storage devices, networking, audio/video, I/O interfaces, and the like. However, such subsystems are often inherently insecure and vulnerable to many different types of threats.

例如,如第1A圖中所示,習知的非安全性電腦150(例如桌上型或筆記型電腦)包括主機系統102,主機系統102通常包括執行作業系統、應用軟體及裝置驅動程式之CPU。電腦150進一步包括與多種電腦子系統有關聯之裝置106,諸如內部驅動器106-1(例如HDD或SSD)、音訊/視訊輸入及輸出裝置106-2(例如顯示器、揚聲器等)、I/O埠 及裝置106-3(例如USB、Firewire等)及網路介面106-4(例如WiFi、以太網路等)。 For example, as shown in FIG. 1A, a conventional non-secure computer 150 (eg, a desktop or notebook computer) includes a host system 102, which typically includes a CPU that executes an operating system, application software, and device drivers. . The computer 150 further includes means 106 associated with various computer subsystems, such as an internal driver 106-1 (e.g., HDD or SSD), an audio/video input and output device 106-2 (e.g., display, speaker, etc.), I/O. And device 106-3 (such as USB, Firewire, etc.) and network interface 106-4 (such as WiFi, Ethernet, etc.).

與此等裝置關聯之子系統的安全性缺乏導致了許多弱點。更特定言之,關於內部驅動器106-1,儲存在內部驅動程式106-1上之資料通常為非加密的。此意謂若該資料被丟棄或該資料被(例如藉由某人竊用電腦150或藉由主機102上之病毒軟體)偷偷地檢查,則可擷取資料內部之內容,包括任何敏感、私用或機密資料。另外,許多使用者並不定期備份彼等使用者之資料,使得驅動器106-1上之資料易受驅動或系統故障的影響。 The lack of security of the subsystems associated with such devices has led to many weaknesses. More specifically, with respect to internal drive 106-1, the data stored on internal driver 106-1 is typically unencrypted. This means that if the material is discarded or the material is sneaked (for example, by someone stealing the computer 150 or by the virus software on the host 102), the content inside the data can be retrieved, including any sensitive or private content. Use or confidential information. In addition, many users do not regularly back up the data of their users, making the data on the drive 106-1 vulnerable to drive or system failure.

即使已加密及/或備份資料,資料之安全級別取決於特定的作業系統及應用程式。另外,若加密密鑰亦本端儲存在電腦150上,則彼等加密密鑰可能被偷偷地存取及使用。關於音訊/視訊輸入及輸出裝置106-2,顯示之資料或播放之音訊可能包括易受竊聽之敏感資訊,特別是當在公共場所中操作電腦150時。然而,當發現此顯示資訊之未經授權的複本時,有時難以證明該未經授權之複本來源或環境。 Even if data is encrypted and/or backed up, the security level of the data depends on the particular operating system and application. In addition, if the encryption key is also stored on the computer 150, their encryption keys may be secretly accessed and used. With regard to the audio/video input and output device 106-2, the displayed data or the audio played may include sensitive information that is susceptible to eavesdropping, particularly when the computer 150 is operated in a public place. However, when an unauthorized copy of the displayed information is found, it is sometimes difficult to prove the source or environment of the unauthorized copy.

關於I/O埠及裝置106-3,諸如USB之標準的I/O通訊協定不提供用於將資料從周邊裝置傳輸至主機系統之任何安全級別。USB資料以明文發送。因此,藉由任何USB協定分析程式或軟體應用程式可俘獲及分析該資料。此外,任何USB周邊裝置能夠連接至主機電腦,因為USB規範不提供任何手段以過濾不需要或潛在有害的裝置。此對企業構成了巨大風險,且更特定言之,對負責保護彼等IT系統及裝置安 全之IT管理員構成巨大風險。更進一步,USB裝置可能含有可在電腦150上運行(且可能潛在地損害電腦150)之可執行程式。 With regard to I/O ports and devices 106-3, standard I/O protocols such as USB do not provide any level of security for transferring data from peripheral devices to the host system. USB data is sent in clear text. Therefore, the data can be captured and analyzed by any USB protocol analysis program or software application. In addition, any USB peripheral device can be connected to the host computer because the USB specification does not provide any means to filter unwanted or potentially harmful devices. This poses a huge risk to the business and, more specifically, is responsible for protecting their IT systems and devices. The entire IT administrator poses a huge risk. Still further, the USB device may contain executable programs that can run on the computer 150 (and potentially potentially damage the computer 150).

關於網路介面106-4,經由網路發送之資料可能包括易於截取之敏感資訊。此外,由電腦150接收之網路資料可能包括有害的應用程式,諸如病毒及惡意程式。一些組織使用如VPN之該等安全協定經由彼等組織的內部網路提供一些安全級別。然而,在組織中並非所有電腦的網路連接均使用VPN安全協定。且即使當彼等網路連接使用VPN安全協定時,在啟動/網路連接之前,彼等協定並不總是自動開啟,為常駐惡意程式提供發送/接收資訊的機會窗口。此外,軟體中的VPN連接相當慢,且彼等連接不支援高頻寬連接,諸如幾百兆位/秒(例如100Mbs或1Gbs及更高的以太網路)的高頻寬連接。原則上,使用組織之電腦的所有網路通訊(無論內部或外部)應受到保護。 With respect to the network interface 106-4, the information sent over the network may include sensitive information that is easily intercepted. In addition, network data received by computer 150 may include harmful applications such as viruses and malware. Some organizations use some of these security protocols, such as VPNs, to provide some level of security through their organization's internal network. However, not all computers in the organization use VPN security protocols for their network connections. And even when their network connections use VPN security protocols, their agreements are not always automatically turned on before the boot/network connection, providing a window of opportunity for the resident malware to send/receive information. In addition, VPN connections in software are quite slow, and their connections do not support high-bandwidth connections, such as high-bandwidth connections of hundreds of megabits per second (eg, 100Mbs or 1Gbs and higher Ethernet). In principle, all network communications (whether internal or external) using the organization's computer should be protected.

從上述應顯而易見,許多應用程式將受益於能夠經由以上或其他子系統無縫且無干擾地添加安全性,及/或受益於經由組織之電腦裝置集中管理該等額外的安全性特徵。 It should be apparent from the above that many applications will benefit from being able to add security seamlessly and without interference via the above or other subsystems, and/or benefit from centrally managing such additional security features via the organization's computer device.

本發明係關於用於保護非安全電腦子系統及IO介面之系統及架構,該系統及架構解決以上不足等等。根據一個態樣,本發明提供用於以安全方式執行軟體之獨立的硬體平臺。根據另一態樣,本發明提供控制及保護所有碟、網路及其他I/O異動之手段。根據更進一步之態樣,本發明提供監 控及防止未授權使用者及惡意軟體活動之手段。額外的態樣包括提供用於裝置及使用者認證以及加密密鑰管理之安全性平臺;提供執行背景備份快照之手段;以及提供致能對電腦操作進行之完全管理的手段。 The present invention relates to systems and architectures for protecting non-secure computer subsystems and IO interfaces that address the above deficiencies and the like. According to one aspect, the present invention provides an independent hardware platform for executing software in a secure manner. According to another aspect, the present invention provides a means of controlling and protecting all discs, networks, and other I/O transactions. According to a further aspect, the present invention provides supervision Control and prevent unauthorized users and malicious software activities. Additional aspects include providing a security platform for device and user authentication and encryption key management; providing means to perform background backup snapshots; and providing means to enable full management of computer operations.

根據此等及其他態樣,根據本發明之實施例之安全性電腦包括:複數個子系統,該複數個子系統用於從儲存裝置接收、儲存、擷取資料及輸出資料;主機系統,該主機系統執行接收、儲存、擷取及輸出資料之作業系統及應用程式;以及安全性子系統,該安全性子系統控制主機系統對該複數個子系統之存取。 According to these and other aspects, a security computer according to an embodiment of the present invention includes: a plurality of subsystems for receiving, storing, extracting, and outputting data from a storage device; a host system, the host system An operating system and an application for receiving, storing, extracting, and outputting data; and a security subsystem that controls access by the host system to the plurality of subsystems.

102‧‧‧主機 102‧‧‧Host

104‧‧‧安全性系統 104‧‧‧Security System

106‧‧‧裝置 106‧‧‧ device

106-1‧‧‧碟 106-1‧‧‧VCD

106-2‧‧‧音訊/視訊裝置 106-2‧‧‧Audio/Video Device

106-3‧‧‧埠 106-3‧‧‧埠

106-4‧‧‧網路 106-4‧‧‧Network

120‧‧‧安全性電腦 120‧‧‧Security computer

150‧‧‧電腦 150‧‧‧ computer

170‧‧‧安全性連接 170‧‧‧Security connection

172‧‧‧連接 172‧‧‧Connect

206‧‧‧遠端管理系統 206‧‧‧Remote Management System

208‧‧‧通訊通道 208‧‧‧Communication channel

220‧‧‧器具 220‧‧‧ Appliances

220-1‧‧‧銷售點裝置 220-1‧‧‧Point of sale device

220-2‧‧‧筆記型電腦 220-2‧‧‧Note Computer

220-3‧‧‧PC 220-3‧‧‧PC

302‧‧‧主機系統 302‧‧‧Host system

304‧‧‧安全性子系統 304‧‧‧Security Subsystem

308‧‧‧通訊通道 308‧‧‧Communication channel

320‧‧‧安全性電腦 320‧‧‧Security computer

352‧‧‧子系統/USB子系統 352‧‧‧Subsystem/USB Subsystem

354‧‧‧子系統/網路子系統 354‧‧‧Subsystem/Network Subsystem

356‧‧‧子系統/儲存子系統 356‧‧‧Subsystem/storage subsystem

358‧‧‧子系統/音訊子系統 358‧‧‧Subsystem/Audio Subsystem

360‧‧‧子系統/視訊/圖形子系統 360‧‧‧Subsystem/Video/Graphics Subsystem

362‧‧‧安全性處理器 362‧‧‧Security Processor

在結合附圖閱讀本發明之特定實施例之以下描述的基礎上,本發明之此等及其它態樣及特徵對於彼等一般熟習此項技術者將變得顯而易見,在該等附圖中:第1A圖為圖示根據先前技術之示例性非安全性電腦系統之方塊圖;第1B圖為圖示根據本發明之實施例之示例性安全性電腦系統的方塊圖;第2圖為圖示根據本發明之實施例用於管理複數個安全性電腦裝置之示例性系統的方塊圖;以及第3圖為圖示根據本發明之實施例用於安全性電腦系統之示例性架構之更詳細的方塊圖。 These and other aspects and features of the present invention will become apparent to those skilled in the <RTIgt; 1A is a block diagram illustrating an exemplary non-secure computer system in accordance with the prior art; FIG. 1B is a block diagram illustrating an exemplary security computer system in accordance with an embodiment of the present invention; A block diagram of an exemplary system for managing a plurality of security computer devices in accordance with an embodiment of the present invention; and FIG. 3 is a more detailed illustration of an exemplary architecture for a security computer system in accordance with an embodiment of the present invention. Block diagram.

現將參閱附圖詳細描述本發明,將該等圖式作為本 發明之說明性實例提供,以便使熟習此項技術者能夠實施本發明。值得注意的是,以下的圖式及實例並不意味將本發明之範疇限於一單一實施例,且經由互換一些或全部所描述或所圖示的元件之其他實施例係有可能的。此外,在使用已知元件可部分地或完全地實施本發明之某些元件時,將僅描述理解本發明所必須的該等已知元件的彼等部分,且將省略該等已知元件之其他部分的詳細描述,以免使本發明難以理解。熟習此項技術者將顯而易見,除非本文另有指定,本文描述之在軟體中實施的實施例將不僅限於此,亦可包括在硬體中實施之實施例或包括在軟體與硬體之組合中實施之實施例及反之亦然。在本說明書中,顯示單數元件之實施例不應視為限制;更確切而言,本發明意欲包含包括複數個同一元件之其他實施例,及反之亦然,除非本文另有明確說明。此外,除另有明確闡述,申請人不意欲將本說明書或申請專利範圍中的任何術語用於不常見或特殊意義。另外,本發明包含本文以說明提及的已知元件之現在和未來的已知同等物。 The present invention will now be described in detail with reference to the accompanying drawings Illustrative examples of the invention are provided to enable those skilled in the art to practice the invention. It is noted that the following drawings and examples are not intended to limit the scope of the invention to a single embodiment, and that other embodiments that interchange some or all of the described or illustrated elements are possible. In addition, when some of the elements of the present invention may be implemented partially or completely using known elements, only those parts of the known elements necessary to understand the invention will be described, and the known elements will be omitted. The detailed description of other parts is provided to avoid obscuring the present invention. It will be apparent to those skilled in the art that, unless otherwise specified herein, embodiments described herein embodied in software are not limited thereto, and may include embodiments implemented in hardware or included in a combination of software and hardware. Embodiments of the implementation and vice versa. In the present specification, the embodiments of the singular elements are not to be considered as limiting; rather, the invention is intended to include other embodiments including the plural elements, and vice versa, unless explicitly stated otherwise. In addition, the Applicant does not intend to use any term in this specification or the scope of the claims for the purpose of the present invention. In addition, the present invention encompasses the present and future known equivalents of the known elements referred to herein.

根據一般態樣,本發明之實施例包括安全性電腦平臺,該安全性電腦平臺形成信賴、安全性處理、安全性I/O及安全性管理之強健區域。在實施例中,安全性電腦架構包括安全性子系統,該安全性子系統與主處理器獨立操作,從而消除對修改主機CPU硬體或軟體(例如作業系統及/或應用程式)的需要。安全性子系統負責安全性電腦之全部的安全性、管理、資料完整性、活動監控、歸檔及合作態樣。根據某些額外態樣,由本發明之實施例執行之安全性功能對上游 主機及下游的一或更多個裝置兩者在邏輯上可為透通的。 In accordance with a general aspect, embodiments of the present invention include a security computer platform that forms a robust area of trust, security handling, security I/O, and security management. In an embodiment, the security computer architecture includes a security subsystem that operates independently of the host processor, thereby eliminating the need to modify host CPU hardware or software (eg, operating systems and/or applications). The security subsystem is responsible for the overall security, management, data integrity, activity monitoring, archiving and collaboration of the security computer. According to certain additional aspects, the security function performed by an embodiment of the present invention is upstream Both the host and one or more devices downstream may be logically transparent.

第1B圖圖示根據本發明之實施例之示例性安全性電腦120。 FIG. 1B illustrates an exemplary security computer 120 in accordance with an embodiment of the present invention.

與第1A圖中之先前技術電腦150相比且根據本發明之某些態樣可見,安全性電腦120包括安全性子系統104。大體上,安全性子系統104與主機102一起操作且係主機102之不可知的部分(亦即主機之硬體、軟體及作業系統)。例如,安全性子系統104既不與主機120共享記憶體空間,亦不可從主機CPU之作業系統及應用程式存取該安全性子系統104。同樣地,主機102幾乎或完全不知道安全子系統104的存在。主機102可見之所有資料係安全的,儲存在碟106-1或經由埠106-3(例如USB大容量儲存裝置)連接之其他裝置上的所有資料或經由網路106-4發送之所有資料係安全的。根據其他態樣,安全性子系統104之操作不減少與裝置106關聯之子系統的效能。 As compared to prior art computer 150 in FIG. 1A and in accordance with certain aspects of the present invention, security computer 120 includes security subsystem 104. In general, the security subsystem 104 operates with the host 102 and is an agnostic portion of the host 102 (ie, the hardware, software, and operating system of the host). For example, the security subsystem 104 neither shares the memory space with the host 120 nor accesses the security subsystem 104 from the operating system and applications of the host CPU. Likewise, host 102 has little or no knowledge of the existence of security subsystem 104. All data visible to host 102 is secure, and all data stored on disk 106-1 or other device connected via port 106-3 (eg, USB mass storage device) or all data transmitted via network 106-4 safe. According to other aspects, the operation of the security subsystem 104 does not reduce the performance of the subsystems associated with the device 106.

安全性電腦120之某些其他態樣與彼等先前技術電腦150形成對比。例如,在桌上型PC實施中,習知的電腦150通常包括開放式介面(未圖示),諸如PCI或PCIe擴展匯流排,藉由該PCI或PCIe擴展匯流排主機102連接至裝置106且與裝置106通訊。然而,本發明者認為此舉存在潛在的安全性破壞,諸如其中可能插入探針,以擷取/插入資料/病毒等。因此,在實施例中,經由安全性連接170,安全性電腦120之主機102僅經由經由安全性子系統104與裝置106通訊,且並不連接至任何擴展匯流排,諸如PCI或PCIe。 Some other aspects of the security computer 120 are in contrast to their prior art computer 150. For example, in a desktop PC implementation, conventional computer 150 typically includes an open interface (not shown), such as a PCI or PCIe expansion bus, by which the PCI or PCIe expansion bus host 102 is coupled to device 106 and Communicating with device 106. However, the inventors believe that there is a potential for security breaches, such as where probes may be inserted to capture/insert data/viruses and the like. Thus, in an embodiment, via secure connection 170, host 102 of security computer 120 communicates with device 106 only via security subsystem 104 and is not connected to any expansion bus, such as PCI or PCIe.

可取決於主機系統102及安全性子系統104之實施,以多種方式實施安全性連接170。在主機系統102包括作為安全性子系統104之位於獨立晶片上(而不是位於共有母板上)的CPU之一個實例中,藉由嵌入母板跡線可實施安全性連接170。在另一實例中,主機系統102及安全性子系統104在共有晶片(諸如SOC)中實施。在此實例中,安全性連接170包括內部晶片跡線。 The secure connection 170 can be implemented in a variety of ways depending on the implementation of the host system 102 and the security subsystem 104. In an example where the host system 102 includes a CPU on the standalone wafer (rather than on the shared motherboard) as the security subsystem 104, the secure connection 170 can be implemented by embedding the motherboard traces. In another example, host system 102 and security subsystem 104 are implemented in a shared wafer, such as an SOC. In this example, the secure connection 170 includes an internal wafer trace.

同樣地,根據本發明之態樣進一步對比習知電腦150,安全性子系統104與裝置106之間的連接172亦受到保護。然而,實質上不可能總是使得外部世界對連接172完全不可存取。因此,在實施例中,藉由加密子系統104與裝置106之間的資料使得此等連接172安全。應注意,本發明之實施例中的某些連接172可包括習知的匯流排,諸如專用的PCIe匯流排。然而,除經由子系統104之外,主機102不直接存取連接至此等連接172之裝置106的任何內容,且反之亦然。 Similarly, in contrast to the conventional computer 150 in accordance with aspects of the present invention, the connection 172 between the security subsystem 104 and the device 106 is also protected. However, it is virtually impossible to always make the external world completely inaccessible to the connection 172. Thus, in an embodiment, such connections 172 are made secure by encrypting the data between subsystem 104 and device 106. It should be noted that certain connections 172 in embodiments of the present invention may include conventional bus bars, such as dedicated PCIe bus bars. However, host 102 does not directly access any of the devices connected to such connections 172 except via subsystem 104, and vice versa.

根據本發明之態樣,安全性子系統104之實施例透通地執行與驅動器106-1有關之以下安全性功能之一或更多者:資料安全性(例如儲存在驅動器106-1上之資料的加密、密鑰管理、防毒掃描);以及資料完整性(例如使用快照機制之基於伺服器的備份)。 In accordance with an aspect of the present invention, an embodiment of the security subsystem 104 transparently performs one or more of the following security functions associated with the driver 106-1: data security (e.g., data stored on the driver 106-1) Encryption, key management, antivirus scanning); and data integrity (such as server-based backup using the snapshot mechanism).

關於埠/裝置106-3,安全性子系統104之實施例透通執行以下安全性功能之一或更多者:資料安全性(例如加密從主機102發送之資料、密鑰管理);守門(例如防止被 禁止裝置連接至主機102);資料偵伺;以及鍵盤及滑鼠仿真(例如藉由子系統104模擬分別來自實際鍵盤及滑鼠裝置106-3之指令的鍵盤及滑鼠指令)。 With respect to device/device 106-3, embodiments of security subsystem 104 transparently perform one or more of the following security functions: data security (eg, encrypting data sent from host 102, key management); gatekeeper (eg, Prevent being The disabling device is connected to the host 102); data logging; and keyboard and mouse emulation (e.g., keyboard and mouse commands that emulate instructions from the actual keyboard and mouse device 106-3, respectively, by subsystem 104).

關於網路介面106-4,安全性子系統104之實施例透通地執行以下安全性功能之一或更多者:VPN(例如穿過意欲保護所有網路訊務之以太網路連接的安全通道);以及三路開關(例如以直接將網路訊務傳入兩個主機102或104之一者)。 With respect to the network interface 106-4, embodiments of the security subsystem 104 transparently perform one or more of the following security functions: VPN (eg, through a secure channel through an Ethernet path connection intended to protect all network traffic) And a three-way switch (for example, to directly transfer network traffic to one of the two hosts 102 or 104).

關於音訊/視訊裝置106-2,安全性子系統104之實施例透通地執行以下安全性功能之一或更多者:來自主機系統102及安全性子系統104之視訊流的視訊疊層;視訊加浮水印;顯示器隱私;螢幕分析,諸如OCR;遠端螢幕檢視;混合來自主機系統102及安全性子系統104之音訊輸入;音訊加浮水印;及將音訊轉發至遠端管理系統。 With respect to the audio/video device 106-2, an embodiment of the security subsystem 104 transparently performs one or more of the following security functions: video overlay from the video stream of the host system 102 and the security subsystem 104; video plus Watermarking; display privacy; screen analysis, such as OCR; remote screen viewing; mixing of audio input from host system 102 and security subsystem 104; audio plus watermarking; and forwarding of audio to a remote management system.

安全性電腦120可經實施作為以下裝置:桌上型PC、筆記本、瘦客戶端、平板電腦、智慧電話、伺服器或任何其他類型之計算裝置(例如遙現單元(TelePresence Unit)、ATM機、工業控制器等)。 The security computer 120 can be implemented as a desktop PC, notebook, thin client, tablet, smart phone, server, or any other type of computing device (eg, TelePresence Unit, ATM, Industrial controllers, etc.).

應注意,在諸如第1圖中所圖示之實施例中,安全性子系統104控制對電腦120之所有介面及周邊裝置106的存取。然而,此舉並非必需,且其他實施例允許主機102以習知的方式直接存取此等裝置中的某些裝置。應進一步注意,裝置及介面106之特定數目及/或組合亦可取決於安全性電腦120之特定實施。 It should be noted that in an embodiment such as that illustrated in FIG. 1, security subsystem 104 controls access to all interfaces of computer 120 and peripheral devices 106. However, this is not required, and other embodiments allow host 102 to directly access certain of these devices in a conventional manner. It should be further noted that the particular number and/or combination of devices and interfaces 106 may also depend on the particular implementation of security computer 120.

在一個可能的實施中,安全性子系統104為獨立子系統,且為不可設置的。然而,根據本發明之某些管理態樣,在實施例中,安全性子系統104為可設置,且藉由遠端管理系統集中或遠端地管理一或更多個安全性電腦。 In one possible implementation, the security subsystem 104 is a separate subsystem and is not configurable. However, in accordance with certain aspects of the present management, in an embodiment, the security subsystem 104 is configurable and one or more security computers are centrally or remotely managed by the remote management system.

第2圖圖示用於根據本發明之實施例實施及管理安全性電腦之系統實例。 Figure 2 illustrates an example of a system for implementing and managing a security computer in accordance with an embodiment of the present invention.

在此實例中,有三種類型之安全性電腦:PC 220-3、筆記型電腦220-2及銷售點裝置220-1,以上之每一者藉由各別通訊通道208連接至遠端管理系統206。儘管未單獨圖示,安全性子系統104嵌入器具220之每一者中,且對該裝置之正常功能透通地操作。 In this example, there are three types of security computers: PC 220-3, notebook 220-2, and point of sale device 220-1, each of which is connected to the remote management system by a separate communication channel 208. 206. Although not separately illustrated, the security subsystem 104 is embedded in each of the appliances 220 and operates transparently to the normal functioning of the device.

在此實例中,安全性PC 220-3類似於習知的獨立桌上型電腦。在該實例中,主機由CPU(例如x86)、習知的作業系統(諸如Windows作業系統)及關聯的裝置驅動程式軟體實施。 In this example, the security PC 220-3 is similar to a conventional stand-alone desktop computer. In this example, the host is implemented by a CPU (eg, x86), a conventional operating system (such as a Windows operating system), and associated device driver software.

同樣地,在此實例中,安全性筆記型電腦220-2類似於習知的獨立筆記型電腦。在該實例中,主機102由CPU(例如x86)、習知的作業系統(諸如Windows作業系統)及關聯的裝置驅動程式軟體實施。然而,與PC 220-3不同,周邊裝置(諸如顯示器、鍵盤及滑鼠)整合在電腦220-2之內部,且不經由外部介面(諸如HDMI及USB)受控制。 Likewise, in this example, the security notebook 220-2 is similar to a conventional stand-alone notebook. In this example, host 102 is implemented by a CPU (e.g., x86), a conventional operating system (such as a Windows operating system), and associated device driver software. However, unlike the PC 220-3, peripheral devices such as a display, a keyboard, and a mouse are integrated inside the computer 220-2 and are not controlled via an external interface such as HDMI and USB.

在安全性銷售點裝置220-1中,主機102可藉由嵌入式及/或工業PC實施。 In the secure point of sale device 220-1, the host 102 can be implemented by an embedded and/or industrial PC.

在安全性電腦220之此等及其他實例中,子系統104 較佳為嵌入式系統。因而,子系統104執行與嵌入式處理器一起提供之指定的軟體系統,且在任何情況下電腦之終端使用者不可修改子系統104。以下更詳細地描述了藉由經調適可在本發明中使用之安全性子系統104執行的安全性功能類型的多種態樣。在由存在之實例教示之後,彼等熟習此項技術者將能夠瞭解如何使用軟體及嵌入式處理器實施本發明之安全性功能。 In this and other examples of security computer 220, subsystem 104 It is preferably an embedded system. Thus, subsystem 104 executes the specified software system provided with the embedded processor, and in any event the terminal user of the computer cannot modify subsystem 104. Various aspects of the type of security function performed by adapting the security subsystem 104 that may be used in the present invention are described in more detail below. After being taught by the examples of existence, those skilled in the art will be able to understand how to implement the security functions of the present invention using software and embedded processors.

第2圖進一步顯示藉由各別通訊通道208耦接至安全性電腦220之遠端管理系統206。可以多種方式實施通道208,可能取決於由系統206管理之裝置的數目及類型。通道208可為系統206與電腦220之間之獨立直接的點到點鏈路。在其他實施例中,通道208可藉由許多電腦220之間共享之傳輸媒體實施。在此等及其他實施例中,媒體可為有線或無線媒體之任一組合,諸如以太網路或無線區域網路。在此等及其他實施例中,藉由使用在習知的協定(諸如UDP或TCP)上執行的專屬協定由公用及專用網路之多種類型及/或組合實施通道208。在一些實施例中,例如使用安全性VPN連接,經由如上所述之三種通訊通道發送之資料經加密以改良安全性。 FIG. 2 further illustrates remote management system 206 coupled to security computer 220 by respective communication channels 208. Channel 208 can be implemented in a variety of ways, depending on the number and type of devices managed by system 206. Channel 208 can be a separate direct point-to-point link between system 206 and computer 220. In other embodiments, channel 208 can be implemented by a plurality of transmission media shared between computers 220. In these and other embodiments, the media can be any combination of wired or wireless media, such as an Ethernet road or a wireless local area network. In these and other embodiments, channel 208 is implemented by multiple types and/or combinations of public and private networks using proprietary protocols implemented on conventional protocols such as UDP or TCP. In some embodiments, the data transmitted via the three communication channels described above is encrypted, for example, using a secure VPN connection to improve security.

根據一般態樣,在本發明之實施例中,遠端管理系統206負責管理控制安全性子系統之安全性功能的策略,包括是否執行資料加密、是否及如何執行資料偵伺、裝置守門清單等。基於此等清單及附接於電腦介面220之裝置,遠端管理系統206經由通道208將適當的設置資訊發送至電腦 220。系統206亦接收且或許進一步處理從裝置220發送至系統206之資料,該等資料諸如來自電腦之監控器的視訊資料、所附接裝置的歷史、鍵盤及滑鼠輸入資料及碟備份資料。 According to a general aspect, in an embodiment of the invention, the remote management system 206 is responsible for managing policies that control the security functions of the security subsystem, including whether to perform data encryption, whether and how to perform data logging, device gatekeeper lists, and the like. Based on such lists and devices attached to computer interface 220, remote management system 206 sends appropriate setup information to the computer via channel 208. 220. System 206 also receives and perhaps further processes data transmitted from device 220 to system 206, such as video data from a monitor of the computer, history of attached devices, keyboard and mouse input data, and disc backup data.

在同在申請中之申請案第13/971,711(UNI-008)號中更詳細地描述了遠端管理系統之多種態樣及/或可經調試在本發明中使用的安全性策略,該申請案之內容以引用之方式全部併入本文中。 The various aspects of the remote management system and/or the security policies that can be debugged for use in the present invention are described in more detail in the application Serial No. 13/971,711 (UNI-008), the application The contents of the case are hereby incorporated by reference in their entirety.

第3圖為根據本發明之實施例之示例性安全性電腦320的方塊圖。 FIG. 3 is a block diagram of an exemplary security computer 320 in accordance with an embodiment of the present invention.

如圖所示,安全性電腦320包括主機系統302及安全性子系統304。主機系統302包括主機系統302自身的CPU(例如x86、基於ARM之應用程式處理器、伺服器CPU、MIPS、QorIQ或PowerPC)、記憶體及I/O子系統。在實施例中,主機系統302無法直接存取安全性子系統304。根據本發明之透通態樣,使用與裝置106之主機系統302的標準介面(諸如標準I/O、網路及儲存介面)實施主機系統302與安全性處理器304之間的介面。在一些實施例中,在專用硬體介面(例如UART)或僅基於硬體交握(例如GPIO)的情況下,安全性子系統304與主機系統302之間可能有使用預定通訊協定控制介面。 As shown, the security computer 320 includes a host system 302 and a security subsystem 304. Host system 302 includes the host system 302's own CPU (eg, x86, ARM-based application processor, server CPU, MIPS, QorIQ, or PowerPC), memory, and I/O subsystems. In an embodiment, host system 302 cannot directly access security subsystem 304. In accordance with the aspect of the present invention, an interface between host system 302 and security processor 304 is implemented using standard interfaces (e.g., standard I/O, networking, and storage interfaces) with host system 302 of device 106. In some embodiments, a predetermined communication protocol control interface may be used between the security subsystem 304 and the host system 302 in the case of a dedicated hardware interface (eg, UART) or hardware-only handshake (eg, GPIO).

安全性子系統304控制安全性電腦320之全部操作,包括主機系統302對所有周邊裝置之存取。重要地是,根據本發明之態樣,除經由安全性子系統304之外,主機系統302不能與一些或所有的電腦系統周邊裝置(諸如USB及 其他I/O裝置、網路介面、儲存裝置及音訊/視訊裝置)直接交換資料。在實施例中,安全性子系統304進一步控制所有的電源管理功能,諸如通電序列、斷電序列及進入及退出低功率模式。另外,首先啟動安全性子系統304中之安全性處理器362,且安全性處理器362最終轉為休眠或斷電。安全性子系統304管理BIOS認證及更新的所有態樣。在同在申請中之申請案第13/396,582中描述具有主機系統320且由安全性子系統304管理其全部操作之電腦的某些態樣,且該等態樣可經調適在本發明中使用。 Security subsystem 304 controls the overall operation of security computer 320, including access by host system 302 to all peripheral devices. Importantly, in accordance with aspects of the present invention, host system 302 cannot be associated with some or all of the computer system peripherals (such as USB and via security subsystem 304). Other I/O devices, network interfaces, storage devices, and audio/video devices exchange data directly. In an embodiment, the security subsystem 304 further controls all power management functions, such as power up sequence, power down sequence, and entering and exiting low power modes. Additionally, the security processor 362 in the security subsystem 304 is first activated and the security processor 362 eventually transitions to sleep or power down. Security subsystem 304 manages all aspects of BIOS authentication and updating. Certain aspects of a computer having a host system 320 and managed by the security subsystem 304 for its overall operation are described in the same application Serial No. 13/396,582, and such aspects can be adapted for use in the present invention.

在電腦320類似於習知的桌上型PC之示例性實施例中,電腦320包括母板、主機CPU、系統匯流排及記憶體。然而,與習知的桌上型PC不同,電腦320不包括主機CPU可存取之擴展匯流排,諸如PCI或PCIe。在一個該實施例中,子系統304藉由與主機CPU分離之ASIC或FPGA實施,且經由母板上之安全性、嵌入式跡線在主機系統302與安全性系統304之間發送資料。在其他實施例(包括電腦320為平板電腦或行動裝置(例如智慧電話)之實施例)中,或在其他實施例(其中功率、面積及/或成本限制為因素)中,在同一SOC中實施主機系統302及安全性子系統304兩者。 In an exemplary embodiment in which computer 320 is similar to a conventional desktop PC, computer 320 includes a motherboard, a host CPU, a system bus, and a memory. However, unlike conventional desktop PCs, computer 320 does not include an expansion bus that is accessible to the host CPU, such as PCI or PCIe. In one such embodiment, subsystem 304 is implemented by an ASIC or FPGA separate from the host CPU and transmits data between host system 302 and security system 304 via security, embedded traces on the motherboard. In other embodiments (including embodiments where the computer 320 is a tablet or mobile device (eg, a smart phone), or in other embodiments (where power, area, and/or cost constraints are factors), implemented in the same SOC Both host system 302 and security subsystem 304.

另一可能的實施例包括將安全性子系統304提供至位於習知電腦之PCIe擴展匯流排中的PCIe卡上。然而,與習知的電腦PCIe擴展匯流排不同,此實施例包括「安全性」PCIe連接器,該連接器將防止有人在連接器與卡之間插入「探針」以便跟蹤主機系統302與安全性子系統304之間的非加 密資料。此安全性連接器較佳為安全的且破壞性的。在製造時可將PCIe卡插入標準母板中,且此後不能將該PCIe卡移除。若有人試圖在此後擷取該PCIe卡,連接器將「損壞」,且將不能重新插入該卡(且該卡不能正常操作)。可機械地或甚至可經由使用可偵測PCIe卡之「異常」插入(亦即存在偵伺裝置,如簡單的PCIe延伸器卡)的智慧感測器達成此效果。 Another possible embodiment includes providing the security subsystem 304 to a PCIe card located in a PCIe expansion bus of a conventional computer. However, unlike conventional computer PCIe expansion busses, this embodiment includes a "security" PCIe connector that will prevent someone from inserting a "probe" between the connector and the card to track the host system 302 and security. Non-addition between sexual subsystems 304 Confidential information. This security connector is preferably safe and destructive. The PCIe card can be inserted into the standard motherboard at the time of manufacture, and the PCIe card cannot be removed thereafter. If someone tries to retrieve the PCIe card afterwards, the connector will be "broken" and the card will not be reinserted (and the card will not operate properly). This effect can be achieved mechanically or even by using a smart sensor that detects an "abnormal" insertion of a PCIe card (ie, a presence device, such as a simple PCIe extender card).

子系統304中的安全性處理器362通常經實施作為嵌入式處理器,諸如ARM或另一嵌入式處理器核。處理器經由共享匯流排(諸如AXI)連接至記憶體及其他系統組件,包括子系統352-360。在實施例中,要求高速資料傳送之組件經由專用的點到點DMA通道連接。 The security processor 362 in the subsystem 304 is typically implemented as an embedded processor, such as an ARM or another embedded processor core. The processor is coupled to memory and other system components, including subsystems 352-360, via a shared bus (such as AXI). In an embodiment, components requiring high speed data transfer are connected via a dedicated point-to-point DMA channel.

儘管第3圖中未詳細圖示,安全性處理器362之實施例包括:CPU(例如單核或多核CPU複合體);本端DDR記憶體及快取記憶體;非揮發性儲存裝置(例如快閃記憶體);周邊裝置(例如I2C、SPI、UART、GPIO等);以及媒體引擎(例如2D/3D圖形、音訊/視訊壓縮)。大體上,安全性處理器362執行兩個主要任務:設置及管理所有子系統,及執行安全性軟體堆疊、應用程式等。 Although not illustrated in detail in FIG. 3, embodiments of the security processor 362 include: a CPU (eg, a single-core or multi-core CPU complex); a local DDR memory and a cache memory; and a non-volatile storage device (eg, Flash memory); peripheral devices (such as I2C, SPI, UART, GPIO, etc.); and media engines (such as 2D/3D graphics, audio/video compression). In general, the security processor 362 performs two main tasks: setting up and managing all subsystems, and executing security software stacks, applications, and the like.

如在第3圖之實例中所示,電腦320亦包括周邊裝置(鍵盤、滑鼠、攝影機、麥克風、揚聲器等)、周邊介面(USB等)、視訊(亦即顯示器)、網路(例如以太網路)、SATA裝置(例如儲存HDD/SSD)。 As shown in the example of FIG. 3, the computer 320 also includes peripheral devices (keyboard, mouse, camera, microphone, speaker, etc.), peripheral interfaces (USB, etc.), video (ie, display), and network (eg, Ethernet). Network), SATA devices (such as storing HDD/SSD).

如進一步所示,及如以下更詳細描述,此等周邊裝 置每一者具有位於安全性子系統304中的對應的子系統352-360,該安全性子系統304本質上實施安全性I/O環境。彼等子系統提供主機系統302與實際的裝置之間的安全性橋接,且實施安全性任務,諸如資料加密/解密、守門及偵伺。根據本發明之態樣,各子系統352-360實時地在最小延遲的情況下及在硬體(快速路徑)中執行對主機系統302透通的此等功能。 As further shown, and as described in more detail below, such peripherals Each of them has a corresponding subsystem 352-360 located in security subsystem 304 that essentially implements a secure I/O environment. These subsystems provide a secure bridge between the host system 302 and the actual device, and implement security tasks such as data encryption/decryption, gatekeeper, and snooping. In accordance with aspects of the present invention, subsystems 352-360 perform such functions that are transparent to host system 302 in real-time with minimal delay and in hardware (fast path).

除管理由子系統352-360執行之安全性任務之外,安全性處理器362執行諸如以下任務:異常處理、分析由子系統352-360俘獲之資料、累積訊務統計等。安全性處理器362亦包括用於經由通訊通道308與遠端管理系統206通訊之網路介面。該等通訊可包括以下內容:從管理系統206接收由子系統352-360執行之安全功能的策略;將子系統352-360俘獲之資料發送至管理系統206;以及將子系統352-360偵測到之某些違規或威脅之警報發送至管理系統206。 In addition to managing security tasks performed by subsystems 352-360, security processor 362 performs tasks such as exception handling, analyzing data captured by subsystems 352-360, accumulating traffic statistics, and the like. The security processor 362 also includes a network interface for communicating with the remote management system 206 via the communication channel 308. The communications may include the following: receiving policies from the management system 206 for security functions performed by the subsystems 352-360; transmitting the data captured by the subsystems 352-360 to the management system 206; and detecting the subsystems 352-360 Some of the violations or threats are sent to the management system 206.

在實施例中,安全性處理器362從多個子系統接收記錄/偵伺之資訊,且執行應用程式以儲存資訊及分析資訊查看是否有潛在威脅行為。此可包括使來自安全性電腦之多個子系統的資料相關,以及使不同安全性電腦之間的資料交叉相關。若已偵測到威脅,則將警報發送至遠端系統206,該遠端系統將作為回應修改策略且將該策略應用至可疑的安全性電腦。此可能限制或關閉某一介面,或封鎖某一使用者或關閉整部電腦等。 In an embodiment, the security processor 362 receives logging/reconnaissance information from a plurality of subsystems and executes an application to store information and analyze the information for potential threat behavior. This may include correlating data from multiple subsystems of a security computer and cross-correlating data between different security computers. If a threat has been detected, an alert is sent to the remote system 206, which will act as a response to modify the policy and apply the policy to the suspected security computer. This may limit or close an interface, or block a user or shut down the entire computer.

在實施例中,USB子系統352負責與所附接之USB 裝置關聯之一或更多個任務,諸如資料安全性(例如加密、密鑰管理)、守門、資料偵伺及鍵盤及滑鼠仿真。例如,在同在申請中之申請案第13/971,582(UNI-007)號、第13/971,604(UNI-009)號及第13/971,632(UNI-010)號更詳地細描述了可經調適在本發明中使用的此等及其他安全性任務的示例性態樣。 In an embodiment, the USB subsystem 352 is responsible for the attached USB The device is associated with one or more tasks, such as data security (eg, encryption, key management), gatekeeper, data logging, and keyboard and mouse emulation. For example, in the same application, applications 13/971, 582 (UNI-007), 13/971, 604 (UNI-009) and 13/971, 632 (UNI-010) describe in more detail Exemplary aspects of these and other security tasks used in the present invention are adapted.

在實施例中,網路子系統354負責與以太網路、WiFi及3G裝置關聯之一或更多個任務,諸如安全性之安全協議、高頻寬連接(例如IPSec、SSL/TLS)及包括分級及流量控制引擎之網路處理。 In an embodiment, network subsystem 354 is responsible for associating one or more tasks with Ethernet, WiFi, and 3G devices, such as security security protocols, high-bandwidth connections (eg, IPSec, SSL/TLS), and including tiering and traffic. Control the network processing of the engine.

在實施例中,儲存子系統356負責與內部或外部儲存裝置(例如SATA裝置)關聯之一或更多個任務,諸如資料安全性(加密、密鑰管理、防毒掃描)、資料完整性(例如使用快照機制之基於伺服器的備份)及資料壓縮。在同在申請中之申請案第13/971,732(UNI-012)號及第13/971,651(UNI-013)號中更詳細地描述了經調試在本發明中使用之此等及其他安全性任務之示例性態樣。 In an embodiment, storage subsystem 356 is responsible for associating one or more tasks with internal or external storage devices (eg, SATA devices), such as data security (encryption, key management, antivirus scanning), data integrity (eg, Server-based backup using snapshot mechanism) and data compression. These and other security tasks that have been debugged for use in the present invention are described in more detail in the application Serial Nos. 13/971,732 (UNI-012) and 13/971,651 (UNI-013). An exemplary aspect.

在實施例中,音訊子系統358及視訊/圖形子系統360負責與音訊/視訊裝置關聯之一或更多個任務,該等裝置諸如顯示器、揚聲器、麥克風及攝影機,該等一或更多個任務諸如多層視訊重調大小、alpha混合、音訊混合、音訊及視訊浮水印(可見及不可見)、2D/3D圖形加速、壓縮、安全性遠端桌面、視訊會議、視訊監視及桌面及視訊分析應用程式。在同在申請中之申請案第13/971,692(UNI-015)中更詳 細地描述了經調試可在本發明中使用之此等及其他安全性任務的示例性態樣。 In an embodiment, the audio subsystem 358 and the video/graphics subsystem 360 are responsible for associating one or more tasks with an audio/video device, such as a display, a speaker, a microphone, and a camera, one or more of the Tasks such as multi-layer video resizing, alpha blending, audio mixing, audio and video watermarking (visible and invisible), 2D/3D graphics acceleration, compression, secure remote desktop, video conferencing, video surveillance and desktop and video analysis application. More detailed in application 13/971,692 (UNI-015) in the same application Exemplary aspects of such and other security tasks that may be utilized in the present invention are described in detail.

在實施例中,遠端管理系統206動態地或根據儲存至及/或發送至安全性子系統304之預定策略控制安全性子系統304如何管理電腦320之操作的每一態樣。在實施例中,遠端管理系統201遠端控制、監控及備份I/O介面,且可視需要限制或完全關閉I/O介面。 In an embodiment, remote management system 206 controls how security subsystem 304 manages each aspect of computer 320 operations, either dynamically or according to predetermined policies stored to and/or sent to security subsystem 304. In an embodiment, the remote management system 201 remotely controls, monitors, and backs up the I/O interface, and can restrict or completely shut down the I/O interface as needed.

在加密/解密寫入儲存裝置及I/O裝置/從儲存裝置及I/O裝置讀取之資料以及網路訊務之實施例中,由遠端管理系統206管理加密及認證密鑰,且可將加密及認證密鑰本端地緩存至安全性子系統304上。 In an embodiment of encrypting/decrypting write storage devices and I/O devices/data read from storage devices and I/O devices, and network traffic, the remote management system 206 manages encryption and authentication keys, and The encryption and authentication keys can be cached locally to the security subsystem 304.

儘管已參考本發明之較佳實施例特別描述本發明,但一般技術者應顯而易見在不脫離本發明之精神及範疇的情況下,可改變且修改形式及細節。附加申請專利範圍意欲包含該等變化及修改。 While the invention has been described with respect to the preferred embodiments of the embodiments of the present invention, it is understood that the invention may be modified and modified without departing from the spirit and scope of the invention. The scope of the additional patent application is intended to cover such changes and modifications.

Claims (20)

一種安全性電腦,包含:複數個周邊子系統,該複數個周邊子系統用於從儲存裝置中接收、儲存及擷取資料及輸出資料;一主機系統,該主機系統執行接收、儲存、擷取及輸出該等資料之一作業系統及應用程式,該主機系統包括一系統匯流排及用於連接該主機系統至一擴展匯流排的一介面,該擴展匯流排與該系統匯流排分離且獨立,該擴展匯流排為周邊組件互連(PCI)及快速PCI(PCIe)擴展匯流排中之一者;一安全性子系統,該安全性子系統控制該主機系統對該複數個周邊子系統之存取,以用於接收、儲存、擷取及輸出該等資料;以及在該主機系統的該擴展匯流排介面及該安全性子系統之間的一安全性連接,該安全性連接將該複數個周邊子系統連接至該主機系統。 A security computer includes: a plurality of peripheral subsystems for receiving, storing, and extracting data and outputting data from a storage device; a host system that performs receiving, storing, and capturing And outputting an operating system and an application of the data, the host system comprising a system bus and an interface for connecting the host system to an expansion bus, the expansion bus is separate and independent from the system bus. The expansion bus is one of a peripheral component interconnect (PCI) and a fast PCI (PCIe) expansion bus; a security subsystem that controls access by the host system to the plurality of peripheral subsystems, For receiving, storing, capturing, and outputting the data; and a secure connection between the extended bus interface of the host system and the security subsystem, the security connection connecting the plurality of peripheral subsystems Connect to the host system. 如請求項1所述之安全性電腦,其中該主機系統包含x86處理器、ARM處理器、MIPS處理器、QorIQ處理器及PowerPC CPU中之一者。 The security computer of claim 1, wherein the host system comprises one of an x86 processor, an ARM processor, a MIPS processor, a QorIQ processor, and a PowerPC CPU. 如請求項1所述之安全性電腦,其中該複數個周邊子系統包括以下之一或更多者:一視訊子系統、一音訊子系統、一儲存子系統、一網路子系統及一通用序列匯流排(USB)子系統。 The security computer of claim 1, wherein the plurality of peripheral subsystems comprise one or more of the following: a video subsystem, an audio subsystem, a storage subsystem, a network subsystem, and a universal sequence. Bus (USB) subsystem. 如請求項1所述之安全性電腦,其中該安全性子系統係藉由現場可程式化閘陣列(FPGA)或應用特定積體電路(ASIC)實施。 The security computer of claim 1, wherein the security subsystem is implemented by a field programmable gate array (FPGA) or an application specific integrated circuit (ASIC). 如請求項1所述之安全性電腦,其中該安全性電腦外部之一遠端管理系統可設置該安全性子系統。 The security computer of claim 1, wherein the security subsystem is set by a remote management system external to the security computer. 如請求項5所述之安全性電腦,其中該遠端管理系統經由一網路與該安全性子系統通訊。 The security computer of claim 5, wherein the remote management system communicates with the security subsystem via a network. 如請求項5所述之安全性電腦,其中該遠端管理系統指定該安全性子系統如何控制該主機系統對該複數個周邊子系統之存取。 The security computer of claim 5, wherein the remote management system specifies how the security subsystem controls access by the host system to the plurality of peripheral subsystems. 如請求項1所述之安全性電腦,其中該安全性子系統包含一嵌入式處理器。 The security computer of claim 1, wherein the security subsystem comprises an embedded processor. 如請求項8所述之安全性電腦,其中該嵌入式處理器包含一ARM處理器。 The security computer of claim 8, wherein the embedded processor comprises an ARM processor. 如請求項1所述之安全性電腦,其中該複數個周邊子系統包含一序列先進技術附件(SATA)儲存子系統。 The security computer of claim 1, wherein the plurality of peripheral subsystems comprise a sequence of Advanced Technology Attachment (SATA) storage subsystems. 如請求項10所述之安全性電腦,其中該SATA儲存子系統支援經由SATA 1.5、3.0及6.0Gbs協定連接之硬驅動器或固態驅動器。 The security computer of claim 10, wherein the SATA storage subsystem supports hard drives or solid state drives connected via SATA 1.5, 3.0, and 6.0 Gbs protocols. 如請求項10所述之安全性電腦,其中該SATA儲存子系統管理該主機系統及該安全性子系統對一附接SATA儲存裝置的優先存取。 The security computer of claim 10, wherein the SATA storage subsystem manages the host system and the security subsystem prioritized access to an attached SATA storage device. 如請求項10所述之安全性電腦,其中該安全性子系統執行以下之一或更多者:在該SATA儲存子系統儲存資料時加密該資料,及該SATA儲存子系統防毒掃描資料。 The security computer of claim 10, wherein the security subsystem performs one or more of: encrypting the data when the SATA storage subsystem stores the data, and the anti-virus scan data of the SATA storage subsystem. 如請求項10所述之安全性電腦,其中該安全性子系統執行自動備份由該SATA儲存系統儲存之資料。 The security computer of claim 10, wherein the security subsystem performs automatic backup of data stored by the SATA storage system. 如請求項14所述之安全性電腦,其中對該主機系統透通地執行該自動備份。 The security computer of claim 14, wherein the automatic backup is performed transparently to the host system. 如請求項3所述之安全性電腦,其中該USB子系統支援經由USB 1.1、2.0或3.0協定連接之任何裝置。 A security computer as claimed in claim 3, wherein the USB subsystem supports any device connected via a USB 1.1, 2.0 or 3.0 protocol. 如請求項16所述之安全性電腦,其中該安全性子系統執行以下之一或更多者:加密經由該USB子系統發送之資料、把守試圖經由該USB子系統附接之裝置,以及偵伺經由該 USB子系統發送或接收之資料。 The security computer of claim 16, wherein the security subsystem performs one or more of: encrypting data transmitted via the USB subsystem, guarding devices attempting to attach via the USB subsystem, and detecting Via this Information sent or received by the USB subsystem. 如請求項3所述之安全性電腦,其中該安全性子系統執行以下之一或更多者:從該主機系統至該視訊子系統之視訊流的視訊疊層、給經由該視訊子系統顯示之視訊加浮水印、對經由該視訊子系統顯示之螢幕的分析、遠端螢幕檢視經由該視訊子系統顯示的視訊,以及遠端儲存及分析經由該視訊子系統顯示之視訊。 The security computer of claim 3, wherein the security subsystem performs one or more of: a video overlay from the host system to the video stream of the video subsystem, for display via the video subsystem Video plus watermarking, analysis of the screen displayed via the video subsystem, remote screen viewing of video displayed via the video subsystem, and remote storage and analysis of video displayed via the video subsystem. 如請求項18所述之安全性電腦,其中對經顯示之螢幕的該分析包含光學文字辨識(OCR)。 The security computer of claim 18, wherein the analysis of the displayed screen comprises optical character recognition (OCR). 如請求項3所述之安全性電腦,其中該安全性子系統執行以下之一或更多者:混合來自該主機系統及該安全性子系統之音訊流以供經由該音訊子系統輸出、給經由該音訊子系統輸出之音訊流加浮水印,以及轉發經由該音訊子系統輸出之音訊至一遠端管理系統。 The security computer of claim 3, wherein the security subsystem performs one or more of: mixing audio streams from the host system and the security subsystem for output via the audio subsystem, The audio stream output by the audio subsystem is added to the watermark, and the audio output through the audio subsystem is forwarded to a remote management system.
TW103128328A 2013-08-20 2014-08-18 Secure computer TWI620089B (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US13/971,677 2013-08-20
US13/971,677 US9231921B2 (en) 2013-08-20 2013-08-20 System and architecture for secure computer devices

Publications (2)

Publication Number Publication Date
TW201516736A TW201516736A (en) 2015-05-01
TWI620089B true TWI620089B (en) 2018-04-01

Family

ID=52481645

Family Applications (1)

Application Number Title Priority Date Filing Date
TW103128328A TWI620089B (en) 2013-08-20 2014-08-18 Secure computer

Country Status (3)

Country Link
US (2) US9231921B2 (en)
TW (1) TWI620089B (en)
WO (1) WO2015026836A1 (en)

Families Citing this family (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9232176B2 (en) 2013-03-04 2016-01-05 Janus Technologies, Inc. Method and apparatus for securing computer video and audio subsystems
US9215250B2 (en) 2013-08-20 2015-12-15 Janus Technologies, Inc. System and method for remotely managing security and configuration of compute devices
US8682999B1 (en) * 2013-09-05 2014-03-25 NCS Technologies, Inc. Systems and methods providing a mobile zero client
US10796002B1 (en) 2014-09-08 2020-10-06 Janus Technologies, Inc. Method and apparatus for establishing a root-of-trust path for a secure computer
US11269984B2 (en) 2014-12-09 2022-03-08 Janus Technologies, Inc. Method and apparatus for securing user operation of and access to a computer system
US10154008B2 (en) * 2014-12-17 2018-12-11 Ncr Corporation Scanner enabled with a secure input/output (I/O) module (SIOM)
US10250595B2 (en) * 2015-03-30 2019-04-02 Gbs Laboratories, Llc Embedded trusted network security perimeter in computing systems based on ARM processors
US10726142B2 (en) 2015-06-02 2020-07-28 Viirii, Llc Operating system independent, secure data storage system
WO2016197155A1 (en) * 2015-06-02 2016-12-08 Viirii, Llc Operating system independent, secure data storage subsystem
US20180081666A1 (en) * 2016-03-11 2018-03-22 Oleksii Surdu Reliable and Secure Firmware Update for Internet of Things (IoT) Devices
US10140493B1 (en) 2016-04-22 2018-11-27 Janus Technologies, Inc. Method and apparatus for taking action based on coded graphical object in video content
US10097563B2 (en) * 2016-05-04 2018-10-09 Gbs Laboratories, Llc Reliable and secure firmware update with a dynamic validation for internet of things (IoT) devices
US10210323B2 (en) * 2016-05-06 2019-02-19 The Boeing Company Information assurance system for secure program execution
US11010475B1 (en) 2016-10-07 2021-05-18 Janus Technologies Inc. Secure computer with multiple operating systems
US11184331B1 (en) * 2016-12-30 2021-11-23 Alarm.Com Incorporated Stream encryption key management
US10417458B2 (en) 2017-02-24 2019-09-17 Microsoft Technology Licensing, Llc Securing an unprotected hardware bus
EP3379445B1 (en) * 2017-03-22 2024-06-12 Diebold Nixdorf Systems GmbH System and method to generate encryption keys based on information of peripheral devices
US12277152B2 (en) 2022-06-23 2025-04-15 Vertiv Corporation System and method for serial-over-IP switch based character string pattern matching and detection

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070047782A1 (en) * 2005-08-23 2007-03-01 Hull Jonathan J System And Methods For Creation And Use Of A Mixed Media Environment With Geographic Location Information
TW200745932A (en) * 2005-10-13 2007-12-16 Sandisk Corp Initialization of flash storage via an embedded controller
US7406711B2 (en) * 2005-09-02 2008-07-29 Motorola, Inc. Method and apparatus for enforcing independence of processors on a single IC
US20090271877A1 (en) * 2008-04-28 2009-10-29 Dafca, Inc. Method to secure embedded system with programmable logic, hardware and software binding, execution monitoring and counteraction
US20120166582A1 (en) * 2010-12-22 2012-06-28 May Patents Ltd System and method for routing-based internet security

Family Cites Families (95)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4598170A (en) 1984-05-17 1986-07-01 Motorola, Inc. Secure microprocessor
JP2831703B2 (en) 1989-06-23 1998-12-02 株式会社東芝 Automatic floor plan calculation device
GB9122673D0 (en) 1991-10-25 1991-12-11 Wynter Paul E Floppy or external drive electronic key lock system
US5715174A (en) 1994-11-15 1998-02-03 Absolute Software Corporation Security apparatus and method
US5724027A (en) 1995-09-28 1998-03-03 Intel Corporation Method and apparatus for providing system security to personal computer systems using transparent system interrupt
US5946469A (en) * 1995-11-15 1999-08-31 Dell Computer Corporation Computer system having a controller which emulates a peripheral device during initialization
KR0174978B1 (en) 1995-12-30 1999-04-01 김광호 Hardware-implemented digital computer system security device
US6088802A (en) 1997-06-04 2000-07-11 Spyrus, Inc. Peripheral device with integrated security functionality
US6061794A (en) 1997-09-30 2000-05-09 Compaq Computer Corp. System and method for performing secure device communications in a peer-to-peer bus architecture
US6098133A (en) * 1997-11-28 2000-08-01 Motorola, Inc. Secure bus arbiter interconnect arrangement
US6453446B1 (en) 1997-12-24 2002-09-17 Magma Design Automation, Inc. Timing closure methodology
US6243851B1 (en) 1998-03-27 2001-06-05 Xilinx, Inc. Heterogeneous method for determining module placement in FPGAs
US6546491B1 (en) 1999-03-19 2003-04-08 International Business Machines Corporation Securing mobile computer systems in a corporate environment
US7225333B2 (en) 1999-03-27 2007-05-29 Microsoft Corporation Secure processor architecture for use with a digital rights management (DRM) system on a computing device
US6324537B1 (en) 1999-09-30 2001-11-27 M-Systems Flash Disk Pioneers Ltd. Device, system and method for data access control
US6594780B1 (en) 1999-10-19 2003-07-15 Inasoft, Inc. Operating system and data protection
US7240303B1 (en) 1999-11-30 2007-07-03 Synplicity, Inc. Hardware/software co-debugging in a hardware description language
WO2001093002A2 (en) * 2000-05-30 2001-12-06 Dataplay, Incorporated Method of decrypting data stored on a storage device using an embedded encryption/decryption means
US7225423B2 (en) 2000-06-30 2007-05-29 Zenasis Technologies, Inc. Method for automated design of integrated circuits with targeted quality objectives using dynamically generated building blocks
US7350204B2 (en) 2000-07-24 2008-03-25 Microsoft Corporation Policies for secure software execution
US7168093B2 (en) * 2001-01-25 2007-01-23 Solutionary, Inc. Method and apparatus for verifying the integrity and security of computer networks and implementation of counter measures
US6480932B1 (en) * 2001-01-31 2002-11-12 Western Digital Technologies, Inc. Computer system having a host computer coupled to a disk drive with a drive-selected-application partition for storing data for execution by the host computer in response to drive-determined conditions
US7320071B1 (en) 2001-05-22 2008-01-15 National Semiconductor Corporation Secure universal serial bus
US20030016825A1 (en) 2001-07-10 2003-01-23 Eastman Kodak Company System and method for secure watermarking of a digital image sequence
US6820160B1 (en) 2001-08-21 2004-11-16 Cypress Semiconductor Corporation Apparatus for optically isolating a USB peripheral from a USB host
TW530202B (en) 2001-12-31 2003-05-01 Icp Electronics Inc Computer peripheral equipment monitor and computer system equipped with the monitor
US7287107B2 (en) * 2002-01-04 2007-10-23 Hewlett-Packard Development Company, L.P. Method and apparatus for passive PCI throttling in a remote server management controller
US7478235B2 (en) * 2002-06-28 2009-01-13 Microsoft Corporation Methods and systems for protecting data in USB systems
WO2004006540A2 (en) * 2002-07-08 2004-01-15 Globespanvirata Incorporated System and method for packet transmission from fragmented buffer
US6782424B2 (en) 2002-08-23 2004-08-24 Finite State Machine Labs, Inc. System, method and computer program product for monitoring and controlling network connections from a supervisory operating system
US7149992B2 (en) 2002-10-23 2006-12-12 Via Technologies, Inc. Method for faster timing closure and better quality of results in IC physical design
US7055113B2 (en) 2002-12-31 2006-05-30 Lsi Logic Corporation Simplified process to design integrated circuits
US6922817B2 (en) 2003-04-04 2005-07-26 Lsi Logic Corporation System and method for achieving timing closure in fixed placed designs after implementing logic changes
US7469343B2 (en) 2003-05-02 2008-12-23 Microsoft Corporation Dynamic substitution of USB data for on-the-fly encryption/decryption
US7337100B1 (en) 2003-06-12 2008-02-26 Altera Corporation Physical resynthesis of a logic design
US7120892B1 (en) 2004-03-03 2006-10-10 Xilinx, Inc. Process for adjusting data structures of a floorplan upon changes occurring
US7987497B1 (en) 2004-03-05 2011-07-26 Microsoft Corporation Systems and methods for data encryption using plugins within virtual systems and subsystems
US20080195872A1 (en) * 2004-03-17 2008-08-14 Digisafe Pte Ltd Method and Device for Protecting Data Stored in a Computing Device
US20060023883A1 (en) * 2004-07-27 2006-02-02 Dell Products L.P. System, method and apparatus for secure data transmissions within an information handling system
WO2006024031A2 (en) * 2004-08-23 2006-03-02 Hewlett-Packard Development Company, L.P. Method and apparatus for redirection of video data
US20060143617A1 (en) * 2004-12-29 2006-06-29 Knauerhase Robert C Method, apparatus and system for dynamic allocation of virtual platform resources
US7396257B2 (en) 2005-05-26 2008-07-08 Itt Manufacturing Enterprises, Inc. Computer input/output (I/O) connector assembly having a security circuit disposed therein
US7340700B2 (en) 2005-05-27 2008-03-04 Lsi Logic Corporation Method for abstraction of manufacturing test access and control ports to support automated RTL manufacturing test insertion flow for reusable modules
US20080276302A1 (en) * 2005-12-13 2008-11-06 Yoggie Security Systems Ltd. System and Method for Providing Data and Device Security Between External and Host Devices
US7962755B2 (en) 2006-04-28 2011-06-14 Ceelox, Inc. System and method for biometrically secured, transparent encryption and decryption
US7818395B2 (en) 2006-10-13 2010-10-19 Ceelox, Inc. Method and apparatus for interfacing with a restricted access computer system
US7635272B2 (en) 2006-08-17 2009-12-22 Acco Brands Usa Llc USB port locking and blocking device
US7971241B2 (en) * 2006-12-22 2011-06-28 Hitachi Global Storage Technologies Netherlands, B.V. Techniques for providing verifiable security in storage devices
KR101391152B1 (en) 2007-04-05 2014-05-02 삼성전자주식회사 Method and apparatus for protecting digital contents stored in USB Mass Storage device
US8011010B2 (en) 2007-04-17 2011-08-30 Microsoft Corporation Using antimalware technologies to perform offline scanning of virtual machine images
US8224247B2 (en) * 2007-05-16 2012-07-17 Texas Instruments Incorporated Controller integrated audio codec for advanced audio distribution profile audio streaming applications
US8321936B1 (en) 2007-05-30 2012-11-27 M86 Security, Inc. System and method for malicious software detection in multiple protocols
CA2692395A1 (en) 2007-07-06 2009-01-15 Kerry Berland Unidirectional usb port
US20090033668A1 (en) 2007-07-31 2009-02-05 Pederson Douglas A Display EDID emulator system and method
CZ2007779A3 (en) 2007-11-08 2009-05-20 Monet+,A.S. Method for securing authorized data submission and device for making the same
JP5414684B2 (en) 2007-11-12 2014-02-12 ザ ニールセン カンパニー (ユー エス) エルエルシー Method and apparatus for performing audio watermarking, watermark detection, and watermark extraction
US7827326B2 (en) * 2007-11-26 2010-11-02 Alcatel-Lucent Usa Inc. Method and apparatus for delegation of secure operating mode access privilege from processor to peripheral
US8171310B2 (en) * 2007-12-24 2012-05-01 Sandisk Technologies Inc. File system filter authentication
US8646040B2 (en) 2007-12-31 2014-02-04 International Business Machines Corporation Method and system for securing access to an unsecure network utilizing a transparent identification member
US7984285B2 (en) 2008-02-26 2011-07-19 Dell Products L.P. Information handling system port security
FR2934395B1 (en) 2008-07-23 2013-01-04 Trusted Logic SYSTEM AND METHOD FOR SECURING A USER INTERFACE
US8122399B2 (en) 2008-08-28 2012-02-21 International Business Machines Corporation Compiler for closed-loop 1×N VLSI design
US7677065B1 (en) 2008-11-18 2010-03-16 Jin Tay Industries Co., Ltd. Lock for a USB connector
IT1392913B1 (en) 2008-12-30 2012-04-02 St Microelectronics Srl METHOD FOR IMPLEMENTING VARIATIONS OF THE FUNCTIONALITY OF A PROJECT LAYOUT OF AN INTEGRATED DEVICE, IN PARTICULAR A SINGLE CHIP OR SYSTEM-ON-CHIP SYSTEM USING FILLING CELLS PROGRAMMABLE THROUGH THE MASK
US9065812B2 (en) 2009-01-23 2015-06-23 Microsoft Technology Licensing, Llc Protecting transactions
US8447722B1 (en) * 2009-03-25 2013-05-21 Mcafee, Inc. System and method for data mining and security policy management
US8955108B2 (en) * 2009-06-17 2015-02-10 Microsoft Corporation Security virtual machine for advanced auditing
US8745365B2 (en) * 2009-08-06 2014-06-03 Imation Corp. Method and system for secure booting a computer by booting a first operating system from a secure peripheral device and launching a second operating system stored a secure area in the secure peripheral device on the first operating system
TWI413898B (en) * 2009-09-15 2013-11-01 Phison Electronics Corp Method and system for data protection, storage device, and storage device controller
US20110102443A1 (en) 2009-11-04 2011-05-05 Microsoft Corporation Virtualized GPU in a Virtual Machine Environment
US20110154023A1 (en) 2009-12-21 2011-06-23 Smith Ned M Protected device management
EP2572310B1 (en) * 2010-05-20 2018-12-19 High Sec Labs Ltd. Computer motherboard having peripheral security functions
US8479290B2 (en) * 2010-06-16 2013-07-02 Alcatel Lucent Treatment of malicious devices in a mobile-communications network
US8631177B1 (en) * 2010-06-24 2014-01-14 Smsc Holdings S.A.R.L. Multi-port device with controller for storage media device port
TW201202996A (en) 2010-07-12 2012-01-16 Walton Advanced Eng Inc Encryption flash disk
US9015649B2 (en) 2010-07-19 2015-04-21 Taiwan Semiconductor Manufacturing Co., Ltd. Method and apparatus for electronic system model generation
US8140733B2 (en) * 2010-08-12 2012-03-20 Emcon Emanation Control Ltd. Secure external computer hub
US8566934B2 (en) 2011-01-21 2013-10-22 Gigavation, Inc. Apparatus and method for enhancing security of data on a host computing device and a peripheral device
US8813218B2 (en) 2012-02-14 2014-08-19 Janus Technologies, Inc. Security-enhanced computer systems and methods
JP5942511B2 (en) * 2012-03-19 2016-06-29 富士通株式会社 Backup device, backup method, and backup program
US9202047B2 (en) * 2012-05-14 2015-12-01 Qualcomm Incorporated System, apparatus, and method for adaptive observation of mobile device behavior
US20130347103A1 (en) * 2012-06-21 2013-12-26 Mark Veteikis Packet capture for error tracking
US9747440B2 (en) * 2012-08-15 2017-08-29 Qualcomm Incorporated On-line behavioral analysis engine in mobile device with multiple analyzer model providers
US8931082B2 (en) * 2012-08-17 2015-01-06 Broadcom Corporation Multi-security-CPU system
US9183402B2 (en) * 2012-08-17 2015-11-10 Broadcom Corporation Protecting secure software in a multi-security-CPU system
US9171170B2 (en) * 2012-08-17 2015-10-27 Broadcom Corporation Data and key separation using a secure central processing unit
JP6382196B2 (en) * 2012-08-18 2018-08-29 フーガ インコーポレイテッド System and method for providing a secure computing environment
US9232176B2 (en) 2013-03-04 2016-01-05 Janus Technologies, Inc. Method and apparatus for securing computer video and audio subsystems
US8973140B2 (en) * 2013-03-14 2015-03-03 Bank Of America Corporation Handling information security incidents
US10275593B2 (en) * 2013-04-01 2019-04-30 Uniquesoft, Llc Secure computing device using different central processing resources
US9424443B2 (en) 2013-08-20 2016-08-23 Janus Technologies, Inc. Method and apparatus for securing computer mass storage data
US9076003B2 (en) 2013-08-20 2015-07-07 Janus Technologies, Inc. Method and apparatus for transparently encrypting and decrypting computer interface data
US9684805B2 (en) 2013-08-20 2017-06-20 Janus Technologies, Inc. Method and apparatus for securing computer interfaces
US11210432B2 (en) 2013-08-20 2021-12-28 Janus Technologies, Inc. Method and apparatus for selectively snooping and capturing data for secure computer interfaces
US9384150B2 (en) 2013-08-20 2016-07-05 Janus Technologies, Inc. Method and apparatus for performing transparent mass storage backups and snapshots

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070047782A1 (en) * 2005-08-23 2007-03-01 Hull Jonathan J System And Methods For Creation And Use Of A Mixed Media Environment With Geographic Location Information
US7406711B2 (en) * 2005-09-02 2008-07-29 Motorola, Inc. Method and apparatus for enforcing independence of processors on a single IC
TW200745932A (en) * 2005-10-13 2007-12-16 Sandisk Corp Initialization of flash storage via an embedded controller
US20090271877A1 (en) * 2008-04-28 2009-10-29 Dafca, Inc. Method to secure embedded system with programmable logic, hardware and software binding, execution monitoring and counteraction
US20120166582A1 (en) * 2010-12-22 2012-06-28 May Patents Ltd System and method for routing-based internet security

Also Published As

Publication number Publication date
US9684794B2 (en) 2017-06-20
US9231921B2 (en) 2016-01-05
US20150058970A1 (en) 2015-02-26
WO2015026836A1 (en) 2015-02-26
TW201516736A (en) 2015-05-01
US20160246977A1 (en) 2016-08-25

Similar Documents

Publication Publication Date Title
TWI620089B (en) Secure computer
US9699216B2 (en) System and method for remotely managing security and configuration of compute devices
JP5976564B2 (en) Security enhanced computer system and method
KR101737726B1 (en) Rootkit detection by using hardware resources to detect inconsistencies in network traffic
TWI620093B (en) Method and apparatus for securing computer mass storage data
CN111742315B (en) Security Red-Black Air Gap Laptop
TWI636377B (en) Method and apparatus for securing computer interfaces
US9875354B1 (en) Apparatus and method for enhancing security of data on a host computing device and a peripheral device
JP2020529681A (en) Secure storage device
CN104951409A (en) System and method for full disk encryption based on hardware
US11210432B2 (en) Method and apparatus for selectively snooping and capturing data for secure computer interfaces
RU2628925C1 (en) System and method for protected transmission of audio-data from microphone to processes
Zhao et al. TEE-aided write protection against privileged data tampering
RU130429U1 (en) TERMINAL AND PROTECTED COMPUTER SYSTEM INCLUDING TERMINAL
US10013578B2 (en) Apparatus for processing with a secure system manager
US11531626B2 (en) System and method to protect digital content on external storage
US8677122B1 (en) Method for processing a secure system manager
Sang et al. A tool to analyze potential I/O attacks against PCs
CN116263689A (en) Computer equipment and control device applied to computer equipment

Legal Events

Date Code Title Description
MM4A Annulment or lapse of patent due to non-payment of fees